Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Going Bright: Wiretapping without Weakening Communications Infrastructure

Published: 01 January 2013 Publication History
  • Get Citation Alerts
  • Abstract

    Mobile IP-based communications and changes in technologies, including wider use of peer-to-peer communication methods and increased deployment of encryption, has made wiretapping more difficult for law enforcement, which has been seeking to extend wiretap design requirements for digital voice networks to IP network infrastructure and applications. Such an extension to emerging Internet-based services would create considerable security risks as well as cause serious harm to innovation. In this article, the authors show that the exploitation of naturally occurring weaknesses in the software platforms being used by law enforcement's targets is a solution to the law enforcement problem. The authors analyze the efficacy of this approach, concluding that such law enforcement use of passive interception and targeted vulnerability exploitation tools creates fewer security risks for non-targets and critical infrastructure than do design mandates for wiretap interfaces.

    Cited By

    View all
    • (2020)Addressing Anonymous AbusesProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376690(1-14)Online publication date: 21-Apr-2020
    • (2018)Digital Wiretap WarrantDigital Investigation: The International Journal of Digital Forensics & Incident Response10.1016/j.diin.2015.04.00514:C(1-16)Online publication date: 20-Dec-2018
    • (2018)Correcting Subverted Random OraclesAdvances in Cryptology – CRYPTO 201810.1007/978-3-319-96881-0_9(241-271)Online publication date: 19-Aug-2018
    • Show More Cited By

    Index Terms

    1. Going Bright: Wiretapping without Weakening Communications Infrastructure
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image IEEE Security and Privacy
        IEEE Security and Privacy  Volume 11, Issue 1
        January 2013
        153 pages

        Publisher

        IEEE Educational Activities Department

        United States

        Publication History

        Published: 01 January 2013

        Author Tags

        1. CALEA
        2. Communications Assistance for Law Enforcement Act
        3. exploit
        4. law enforcement
        5. national security
        6. security
        7. surveillance
        8. telecommunications
        9. wiretap

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 27 Jul 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)Addressing Anonymous AbusesProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376690(1-14)Online publication date: 21-Apr-2020
        • (2018)Digital Wiretap WarrantDigital Investigation: The International Journal of Digital Forensics & Incident Response10.1016/j.diin.2015.04.00514:C(1-16)Online publication date: 20-Dec-2018
        • (2018)Correcting Subverted Random OraclesAdvances in Cryptology – CRYPTO 201810.1007/978-3-319-96881-0_9(241-271)Online publication date: 19-Aug-2018
        • (2017)Mass surveillance and technological policy optionsComputer Standards & Interfaces10.1016/j.csi.2016.09.01150:C(76-82)Online publication date: 1-Feb-2017

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media